Saturday, 7 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > DEF CON research takes aim at ZTNA, calls it a bust
Global Market

DEF CON research takes aim at ZTNA, calls it a bust

Last updated: August 18, 2025 6:45 am
Published August 18, 2025
Share
Shutterstock
SHARE

Main vendor vulnerabilities span authentication and design flaws

The analysis uncovered essential vulnerabilities throughout Verify Level, Zscaler and Netskope that fell into three main classes: authentication bypasses, credential storage failures and cross-tenant exploitation.

Authentication bypass vulnerabilities

Zscaler’s SAML implementation contained essentially the most extreme authentication flaw. The researchers found that the signature on the SAML assertion was solely checked for presence, and it wasn’t validated in opposition to the identification supplier’s public key. This allowed full bypass of identification supplier authentication by forging SAML responses with invalid signatures.

Netskope suffered from an identical however extra basic bypass. The enrollment API required no authentication, permitting attackers to register gadgets utilizing solely leaked group keys and legitimate electronic mail addresses. 

Verify Level’s vulnerability centered on hard-coded encryption keys embedded in consumer binaries. These keys protected diagnostic log uploads containing JSON Internet Tokens (JWTs) that lived for 30 days creating a possible compromise situation for any buyer who had uploaded logs to help.

Credential storage and token administration flaws

All three distributors applied weak credential storage mechanisms. Zscaler saved Machine Token Authentication credentials in Home windows registry in clear textual content, permitting native attackers to extract tokens and impersonate any consumer by modifying registry values. Netskope’s “Safe Enrollment” tokens used DPAPI encryption with inadequate safety.

Vendor response and remediation

Vendor responses different considerably in velocity and effectiveness. In line with the researchers, Zscaler responded most quickly, initially patching their SAML vulnerability (CVE-2025-54982) inside 4 hours. Nevertheless, the repair launched compatibility points requiring a rollback earlier than a everlasting answer was applied.

See also  UCC research innovations could have an impact on the development of quantum computing

Source link

TAGGED: Aim, bust, calls, Con, Def, Research, Takes, ZTNA
Share This Article
Twitter Email Copy Link Print
Previous Article Salesforce's new CoAct-1 write their own code to accomplish tasks Salesforce’s new CoAct-1 write their own code to accomplish tasks
Next Article The evolution of data center semiconductors: Navigating the AI revolution The evolution of data center semiconductors: Navigating the AI revolution
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Equalizer Introduces New Meta Aggregator and Airdrop Explorer Services

Road Town, British Virgin Islands, February 6th, 2024, Chainwire Equalizer Elevates Their DeFi Platform with…

February 6, 2024

Better Medicine Raises €1M in Pre-Seed Funding

Better Medicine, a Tartu, Estonia-based startup growing AI-powered diagnostic instruments for radiology, raised €1M in…

August 14, 2025

Why shadow IT is a growing security concern for data centres

With shadow IT and ‘shadow AI’ turning into routine throughout organisations, Terry Storrar, Managing Director…

December 22, 2025

OpenAI data residency advances enterprise AI governance

For chief information and data officers, particularly in tightly regulated sectors, information governance has been…

October 26, 2025

Lawrence Livermore supercomputer is crowned world’s speediest

by Lisa M. Krieger, The Mercury Information Credit score: Pixabay/CC0 Public Area The Bay Space…

November 24, 2024

You Might Also Like

Panasonic launches new unit dedicated to liquid cooling
Global Market

Panasonic launches new unit dedicated to liquid cooling

By saad
URL HTTP Web Address
Global Market

AI transforms ‘dangling DNS’ into automated data exfiltration pipeline

By saad
Can data centres scale AI without putting water under pressure?
Global Market

Can data centres scale AI without putting water under pressure?

By saad
Cisco building exterior with sign
Global Market

Cisco issues emergency patches for critical firewall vulnerabilities

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.